Geo-Spatial Location Spoofing Detection for Internet of Things

@article{Koh2016GeoSpatialLS,
  title={Geo-Spatial Location Spoofing Detection for Internet of Things},
  author={Jing Yang Koh and Ido Nevat and Derek Leong and Lawrence Wai-Choong Wong},
  journal={IEEE Internet of Things Journal},
  year={2016},
  volume={3},
  pages={971-978}
}
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced location spoofing detection using audibility (ELSA), which can be implemented at the backend server without modifying existing legacy IoT systems. ELSA is based on a statistical decision theory framework and uses two-way time-of-arrival (TW-TOA) information between the user's device and the anchors. In addition to the TW-TOA information… CONTINUE READING
6
Twitter Mentions

Citations

Publications citing this paper.
SHOWING 1-10 OF 14 CITATIONS

A Range-Based Secure Localization Algorithm for Wireless Sensor Networks

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Shared Context-Based Compression Paradigm for Ubiquitous Local Transmissions

VIEW 1 EXCERPT
CITES BACKGROUND

Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic

VIEW 1 EXCERPT
CITES METHODS

CUSUM-based Joint Jammer Detection and Localization

Comprehensive Assessment of Security Attack Detection Algorithms in Internet of Things

VIEW 1 EXCERPT
CITES METHODS

ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries

VIEW 2 EXCERPTS
CITES BACKGROUND

Identification of Location Spoofing in Wireless Sensor Networks in Non-Line-of-Sight Conditions

VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 33 REFERENCES

Relative location estimation in wireless sensor networks

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Security Games for Node Localization through Verifiable Multilateration

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Secure Location Verification Using Simultaneous Multilateration

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Secure and Robust Localization in a Wireless Ad Hoc Environment

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Locating the nodes: cooperative localization in wireless sensor networks

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

INFERENCE AND MISSING DATA

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Location Verification Systems for VANETs in Rician Fading Channels

VIEW 3 EXCERPTS

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

VIEW 2 EXCERPTS